Objectives
- Learn basic principles of Cybersecurity and identify common vulnerabilities.
- Develop an approved information security risk management program.
- Understand the legal implications of data privacy and cybersecurity laws and regulations.
- Monitor system logs for suspicious activity or threats to the network infrastructure and identifying any trends/patterns from that activity.
- Analyze malware, viruses, rootkits, Trojans, exploits, and other malicious software to understand their impact on the organization’s networks and systems.
- Design secure networks utilizing firewalls, access control lists (ACLs), virtual private networks (VPNs) encryption technologies etc.
- Configure user accounts with appropriate permissions on systems to ensure maximum security of data resources.
- Investigate incidents of unauthorized access or misuse of computer resources while gathering crucial prove in support of disciplinary actions or criminal prosecutions in applicable cases.
Reviews
There are no reviews yet.